Defending Education: Top Cyber Security Challenges in Higher Education
Cyber security has become a critical issue for higher education (HE) institutions due to their unique structures. Academic institutions have open environments where many users access shared networks from various devices and locations.
This makes them prime targets for cyberattacks. Common threats include phishing attacks, ransomware, Distributed Denial of Service (DDoS) attacks, and data breaches. Plus, the rise of remote learning and cloud adoption has increased the potential attack surface for many educational institutions, making it harder to manage cyber security.
Understanding the Threat Landscape
Higher education institutions are attractive targets for threat actors due to their decentralised structures, large user bases, and the diversity of data they store.
Universities, for example, often have open networks to support collaboration and research, creating vulnerabilities and exploitable gaps in infrastructure. They typically hold valuable intellectual property, cutting-edge research, financial data, and personal student/staff information. Additionally, a blend of staff, students, and external collaborators using a range of different devices further complicates security oversight and can make endpoint security management a living nightmare.
Considering all of these factors, Higher Education Institutions appeal to a wide spectrum of motives for threat actors to target them; nation-states may target them for espionage and to obtain valuable research data, while ransomware groups view them as lucrative opportunities due to their reliance on constant system availability for academic and administrative purposes.
In the past year alone, 97% of UK higher education institutions reported cyber incidents, spanning across a wide variety of attack vectors and methods, according to a recent survey by the NCSC.
Common Cyber Security Challenges in Education
Here are some key findings detailing the quantity of different types of cyber-attacks that further education colleges and higher education institutions have encountered over the past 12 months:
Phishing Attacks
Phishing attacks were extremely common across both sectors, with 100% of higher education institutions and 97% of further education colleges reporting incidents.
Impersonation Attacks
90% of higher education institutions and 78% of further education colleges experienced impersonation attacks, where attackers pretended to be from the organisation.
Viruses, Spyware, or Malware
Higher education institutions reported significantly higher incidents of viruses, spyware, or malware (77%) compared to 32% in further education colleges.
Access
Higher education faced more issues with unauthorised access to files or networks, with 27% of breaches caused by staff and 20% by outsiders. For further education colleges, 19% involved staff, but 0% by outsiders.
Other Breaches or Attacks
There was a considerable difference in miscellaneous breaches or attacks, with 47% of higher education institutions and 16% of further education colleges reporting incidents outside the standard categories.
[source: NCSC]
Key security and compliance challenges facing Higher Education
Decentralised Structures and User Diversity
Universities host a mix of staff, students, and external collaborators who access networks from various devices. This diversity increases the attack surface, making it harder to monitor and secure endpoints. Additionally, many departments and research teams have different security protocols or lack them altogether, creating inconsistent defences across the institution.
Appeal to Threat Actors: Espionage and Financial Crimes
Higher education institutions hold valuable intellectual property, particularly in research areas such as technology, health, and defence, making them appealing to nation-state actors seeking espionage. Ransomware groups and financially motivated cybercriminals also target these institutions due to the critical reliance on availability, making them more likely to pay to regain access to encrypted systems.
Cyber Security Awareness
With the variety of users and devices, human error is one of the largest vulnerabilities. Phishing attacks are common and can quickly compromise critical systems. Awareness training for students, faculty, and staff is often inconsistent or lacking.
Securing Research Data and Intellectual Property
Beyond financial crimes, universities are repositories of cutting-edge research and data. This makes them attractive targets for espionage, particularly for international competitors seeking technological advantages.
Best Practices and Recommendations for Higher Education Institutions
To effectively combat cyber threats, higher education institutions must adopt a proactive and tailored cyber security strategy. This begins with conducting a comprehensive risk assessment to measure their overall cyber security posture, but also to understand what makes their institution an attractive target specifically.
Universities and colleges should consider the assets they hold—whether it’s sensitive student data, valuable research project data, or intellectual property. Furthermore, institutions need to evaluate their relationships with external collaborators, including research partners, government agencies, and private corporations, as these partnerships may expose them to additional risks.
Geographic location can also influence the threat landscape, particularly if the institution is involved in research or collaborations that are of interest to state-sponsored actors. People of interest who teach among faculties or attend universities can attract both influence and risk. The NCSC has published guidance for HE institutions supporting VIPs and high-risk individuals.
With the right guidance and expertise, information security teams, compliance teams and other internal stake holders can identify where their biggest risks are within their estate, the most likely threat actors to target them, and thus the most likely methods and techniques they are to deploy, ultimately providing a “blueprint” for an optimal cyber security strategy and posture hardening.
With this understanding in place, universities can then implement best practices such as:
Adopting a Zero Trust Architecture
This approach assumes no user or device is trusted by default, even if they are already inside the network. This approach is especially crucial for higher education institutions, given their vast, open networks, with users accessing resources from diverse locations and devices.
Example in Higher Education: Universities can implement micro-segmentation within their networks to limit the movement of attackers if a breach occurs. For example, restricting student access to sensitive research databases or administrative systems through segmented network zones can prevent unauthorised access, even if an attacker has already breached one area.
Another common practice is continuous authentication, where the system regularly checks user credentials and behaviour, such as location, device type, or network usage, to identify any anomalies that could indicate a breach.
The University of California, Berkeley has adopted a Zero Trust approach by implementing secure, role-based access controls for its academic resources, minimising access privileges for non-administrative users. Their system continuously verifies user identity, reducing the risk of lateral movement by attackers. [source: The University of California, Berkeley]
Strengthening Access Controls
Implementing Multi-Factor Authentication (MFA) and Role-Based Access Control (RBAC) ensures only authorised individuals have access to critical systems and data.
MFA requires users to present two or more forms of verification (something they know, something they have, and something they are). This is particularly effective in defending against phishing attacks, which are highly prevalent in higher education.
Example in Higher Education: Implementing MFA across university systems for both students and staff can prevent unauthorised access even if login credentials are stolen. For example, universities can require students to verify their identity using a mobile app or a hardware token in addition to their password.
The University of Oxford rolled out a university-wide MFA system, requiring all staff and students to authenticate using both their university credentials and an additional form of verification, such as a mobile phone app or security token. This has drastically reduced successful phishing attacks by ensuring that stolen passwords alone are not enough to gain access. [source: The University of Oxford]
Regular Software Updates and Endpoint Protection
Ensuring that all devices, including personal ones used for work (BYOD), have up-to-date antivirus and firewall protection is crucial. Regular software updates are vital to patch known vulnerabilities. Additionally, enabling remote wipe capabilities for lost or compromised devices ensures sensitive data can be erased quickly.
Phishing and Social Engineering Awareness Training
Employees are often the first line of defence against cyber threats. Regular training sessions on phishing, social engineering, and secure data handling can significantly reduce the risk of human error leading to a security breach.
Collaborating with External Cyber Experts
Partnering with cyber security experts, especially in the field of penetration testing, Managed Security Service Providers and Incident Response, or government agencies can provide higher education institutions with real-time threat intelligence, access to advanced security technologies, insights into vulnerabilities and misconfigurations across their estate and provide assurance that their assets and users will be safeguarded in the event of a cyber attack or data breach.
Managed Detection and Response (MDR)
Endpoint detection alone is no longer sufficient given today’s digital threat landscape. Organisations must now employ an “always-on” threat detection and monitoring capability. However, employing and retaining qualified cyber security analysts and engineers can be very expensive. Running a 24/7 SOC (Security Operations Centre) in-house with experienced analysts and security experts with state-of-the-art defensive technologies are typically reserved for multi-national conglomerates and global tier 1 banks.
MDR services provide continuous monitoring and analysis of an organisation’s entire estate, including endpoints, network traffic and activity logs. By outsourcing to experts, firms can ensure that threats are detected and mitigated in real-time, reducing the risk of a successful attack.
Incident Response and Recovery
Having a robust incident response plan is essential for mitigating the damage caused by cyber incidents. Higher education institutions should invest in both in-house and outsourced incident response teams to ensure a swift and effective reaction to breaches and conduct regular assessments of their cyber incident response plans (CIRP) or ‘tabletop exercises’ simulating various cyber incident scenarios to ensure that their response strategies are robust and understood by all risk owners.
Vulnerability Management
Regularly updating and patching software, coupled with continuous vulnerability assessments, is vital for maintaining a secure infrastructure. Cyber security as a Service (CSaaS) solutions, such as CyberLab Control, can help organisations manage vulnerabilities effectively without overburdening internal teams.
Conclusion: Proactive Defence in Higher Education
To safeguard the wealth of data and intellectual property, higher education institutions must adopt a proactive, layered approach to cyber security. By addressing the unique challenges of decentralised networks and diverse users, universities can build a strong defence against increasingly sophisticated cyber threats.
Detect. Protect. Support.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.